Checking-In: Are You Giving Away Too Much Information?

risks of checking in__header
The phenomenon of people using their smartphone or tablet to check-in to places has become extremely popular in the recent years. Location-based social networks such as Foursquare, Twitter, and Facebook allow users to easily announce where they are and who they are with. So, why do people check-in, and what are the potential risks of announcing your whereabouts to the rest of the world?
Continue Reading… Checking-In: Are You Giving Away Too Much Information?

Are You Being Watched Through Your Webcam?

Hacked webcam_404_header2
A few clicks of the mouse, and your webcam is activated and ready to be used. But have you considered the possibility that someone else could be watching you through your own webcam? The thought of this probably sends chills down your spine, and it should, as this is very real- and extremely creepy.
Continue Reading Are You Being Watched Through Your Webcam?

Protecting Kids Online

Keeping Kids Safe Online_header
With kids accessing the Internet to check their email, to browse the Web and play online games, or just to stay connected with friends and family through chat or social networking services, the risk of being exposed to many online dangers becomes very real. Here in our infographic, we address some of the online dangers kids could face, ways they can be exposed, and a few steps parents can take to keep their kids safe.
Continue Reading… Protecting Kids Online

What to Do When Your Device is Stolen

STOLEN DEVICE_HEADER
Your iPhone or iPad probably has your entire life on it—from photos, apps, contacts, and communications. What would you do if it is ever stolen?

There are some preemptive measures you can take to make the loss less traumatic in the event your device does get stolen.
Continue Reading… What to Do When Your Device is Stolen

What Apps Have Access to Your Facebook and Twitter?

Facebook and Twitter apps access_header

While social media sites such as Facebook and Twitter make it easy to share things with your friends, they also make it easy to log in to various services and applications, too. As authentication brokers, Facebook and Twitter let users use their account credentials to sign into third-party sites. To do so, the user has to give permission for those sites to access their profile data.

Facebook is a full-blown apps ecosystem. You may have added an app to take advantage of a promotion or contest, played a game, or added new functionality such as music streaming. In most cases, it just means the app developer has access to some of your profile data. In the worst-case scenario, a malicious developer behind the service can use your account to send out spam.
Continue Reading… What Apps Have Access to Your Facebook and Twitter?

Secure your entire family

Our Products

ZoneAlarm Extreme Security

ZoneAlarm
Extreme Security

Virus free.
100% Guaranteed.

Learn more
ZoneAlarm Anti Virus

ZoneAlarm
Pro antivirus & firewall

Virus and spyware protection.

Learn more
ZoneAlarm Firewall Pro

ZoneAlarm
Pro Firewall

Blocks hackers and intruders

Learn more

Recent Tweets

Secure your family